Nist Guide To Bluetooth Security

Legal Processes: Eu Digital Strategy Iot Biometrics Policing Program Us Surveillance Ads

NIST SP 800-115 Technical Guide to Information Security Testing and Assessment – P2

The EU Parliament moved on the implementation of the Digital Services Act, , that regulates platforms for a safer online space for users. MEPs gave the green light to open negotiations with member states. The Parliament introduced several changes to the Commissions proposal, exempting micro and small enterprises from certain obligations, including on:

  • Targeted advertising: more transparent and informed choice for the recipients of digital services, including information on how their data will be monetised.
  • Refusing consent shall be no more difficult or time-consuming than giving consent.
  • If their consent is refused or withdrawn, recipients shall be given other options to access the online platform, including options based on tracking-free advertising.
  • Targeting or amplification techniques involving the data of minors or special categories of data for the purpose of displaying ads will be prohibited.
  • Recipients of digital services and organisations representing them must be able to seek redress for damages.
  • Platforms should be prohibited from using user deceiving or nudging techniques.
  • Very Large Online Platforms should provide at least one recommender system that is not based on profiling.

The EU Commission published its latest competition sector inquiry report into the consumer Internet of Things, IoT. Among the main areas of potential concerns are:

Itl Bulletin: Security Of Bluetooth Systems And Devices: Updated Guide Issued By The National Institute Of Standards And Technology

Alternate Title: Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology

“Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology, which is used primarily to establish wireless personal area networks , has been integrated into many types of business and consumer devices examples include cell phones, laptops, automobiles, medical devices, printers, keyboards, computer mouse devices, and headsets. Bluetooth technology enables users to establish ad hoc networks supporting voice and data communications between a wide variety of devices that can be conveniently interconnected without the need for cables or wired connections. The Information Technology Laboratory at the National Institute of Standards and Technology recently issued Special Publication 121, Revision 1, ‘Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology’, to help organizations effectively protect their Bluetooth devices from security threats and vulnerabilities. The revised publication updates the original version of SP 800-121, which was issued in October 2008. Since the publication of the original version, many changes and improvements in Bluetooth technology have been implemented in commercial devices. These changes offer new capabilities and services for users, but also may introduce new threats and vulnerabilities to information systems.”

Big Tech: Apple Airtags Googles Age

Police across the US are reporting cases where stalkers have used Apple AirTags to target their victims, according to the Guardian. Paired with the FindMy app, the attachable coin-sized gadget was designed so you would never lose anything again, but slipped into a bag or coat pocket it is the perfect tracking device for criminals. Other international police forces have also reported similar abuse of the AirTag, and associated car theft. While the AirTags several anti-abuse features mean it is less dangerous than other stalkerware available, an additional problem is the inconsistency of police response. A 2021 Norton report claims stalkerware is growing fast, jumping in 2020 and the first half of last year.

Google has fallen foul of the rules of the UKs Childrens code, introduced last September, which sets online services 15 privacy and design standards to protect minors. Google said it would immediately improve enforcement of an age-sensitive ad policy after . Campaigners 5 Rights Foundation, which reviewed Reuters findings, say all tech companies should do more to ensure compliance with the new rules and consumers should beware of safety washing as there were still too many cases, indicating companies had yet to get serious about implementing changes.

Recommended Reading: Bluetooth Keyboard And Mouse For Laptop

Enterprise Network Device Security

Security for cloud based services can be classified into three areas of vulnerabilities. The physical security protocol, establishes protocols for the protection of physical assets at a geographical location, infrastructure security, establishes protocols for the ensuring that security patches are updated as soon as possible, ports are scanned for abnormal behavior and data and access security deals with data encryption and user privileges control.

Cloud services are remotely hosted , run and managed by leading tech companies, and this sometimes give the false belief that it is impervious to security challenges. highlights some security challenges that cloud services face such as data breaches, human errors, data loss with no backup, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, advanced persistent threats and meltdowns.

While there are numerous benefits to using a cloud based service such as Amazon cloud services and Microsoft azure, they take security seriously and try to implement some protocols that protect data transmitted and stored on their infrastructure.

Microsoft Azure on the other hand is its adoption of an azure active directory which is the singular platform for authorization and permissions management, but it still has some vulnerability as ports and destinations are left open and exposed to the internet, during default initiation.

* Nist Guide To Bluetooth Security

9781478168966: Guide to Bluetooth Security ...

Network World|

Computer scientists Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the NIST has collaborated with John Padgette, an associate at Booz Allen Hamilton to write a new Special Publication entitled “Guide to Bluetooth Security,” which summarizes the security issues and provides recommendations for protecting sensitive information carried via these wireless systems.

Technical jargon can sometimes cause confusion or amusement among non-technical friends for example, it still amuses my wife to hear that I am going to the Vermont InfraGard meeting she persists in claiming that it sounds like a brand of deodorant.

Bluetooth technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other.

The brief document provides an overview of the technology. The diagrams in section 2 are excellent and indeed, the entire publication can serve instructors well for courses on data communications and network security.

The recommendations, which are discussed in detail, are as follows :

Organizations should use the strongest Bluetooth security mode available for their Bluetooth devices.

4 PIN management is lacking.

Recommended Reading: Wireless Bluetooth Headset For Tv

Phantom Security Elements And Considerations

Encryption, decryption and authentication are handled in the Phantom Eco-System by the Cryptocel-310 in order to deliver high performance in Bluetooth mesh networks. The Bluetooth mesh network already has some security features such as encryption and authentication of all mesh messages, independent addressing of network security, device security and application security, key refresh procedures, message obfuscation, secure creation of nodes in a mesh network, secure removal of node in the mesh network to prevent trash can attacks. The security protocols of mesh networks or individual applications with Bluetooth 5.0 cannot be reduced or switched off, thus it is always ever present.

To achieve a separation of concerns, three different security keys provide security to different aspects of the mesh namely, the network key , which allows a node to encrypt and authenticate up to the network layer, the application key , which allows a node to decrypt application data, and the device key , which is unique to each node , and allows for secure communication with the provisioner in a provisioning process.

Figure 4: Bluetooth Smart Ready Network

Once the keys have been generated , there are four pairing modes namely, numeric comparison , just works , passkey entry and the out of band , which is using a communication channel outside the main stream Bluetooth channels. The entire pairing process is as shown in fig 5

Figure 5: Bluetooth Pairing

Data Breaches Investigations And Enforcement Actions: Aggressive Telemarketing Red Cross Demonstrators It Solutions Failed Security

The Italian data protection authority, Garante, fined Enel Energia, , 26,5 mln euros for aggressive telemarketing, consumer data used without consent and failure to comply with the accountability principle. The decision was issued following hundreds of complaints by users who had received unsolicited calls, some of them based on pre-recorded messages. Others had found it difficult to exercise their data protection rights and had encountered problems handling their data in connection with the supply of utility services both on the companys website and through the app released to manage power consumption. Enel Energia was ordered to bring all processing by its sales network into compliance with suitable arrangements, to implement further technical and organisational measures to handle data subjects requests, in particular, the right to object to processing for promotional purposes, and to provide feedback on those requests by no later than 30 days.

Also Check: Refurbished Harman Kardon Bluetooth Speaker

Guide To Bluetooth Security

Supersedes:SP 800-121 Rev. 2

John Padgette , John Bahr , Mayank Batra , Marcel Holtmann , Rhonda Smithbey , Lily Chen , Karen Scarfone


Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks , and has been integrated into many types of business and consumer devices. This publication provides information on the security capabilities of Bluetooth and gives recommendations to organizations employing Bluetooth wireless technologies on securing them effectively. The Bluetooth versions within the scope of this publication are versions 1.1, 1.2, 2.0 + Enhanced Data Rate , 2.1 + EDR, 3.0 + High Speed , 4.0, 4.1, and 4.2. Versions 4.0 and later support the low energy feature of Bluetooth.

Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks , and has been integrated into many types of business and consumer devices. This publication provides information on the security capabilities of Bluetooth and gives recommendations to organizations employing Bluetooth wireless technologies on securing them effectively. The Bluetooth versions within the scope of this publication are versions 1.1, 1.2, 2.0 + Enhanced Data Rate , 2.1 + EDR, 3.0 + High Speed , 4.0, 4.1, and 4.2. Versions 4.0 and later support the low energy feature of Bluetooth.

Official Guidance: Bluetooth Security Clinical Trials Code Of Conduct The Right To Access Housing Processor/eu Representative

Security Measures Every Android User Should Know

The US National Institute of Standards and Technology, NIST, publishes its updated guide on Bluetooth security. Bluetooth wireless technology is used primarily to establish wireless personal area networks, and has been integrated into many types of business and consumer devices. The Bluetooth specifications define several security modes, and each version of Bluetooth supports some, but not all, and some do not require any security at all. The updated NIST guide provides exhaustive information on the security capabilities of Bluetooth and gives step-by-step management, technical and operational recommendations to organizations employing Bluetooth wireless technologies on securing them effectively.

The European Federation of Pharmaceutical Industries and Associations, EFPIA, confirmed that its GDPR Code of Conduct on Clinical Trials and Pharmacovigilance has progressed to the final phase of review by data protection authorities prior to formal submission to the EDPB for approval. The EFPIA believes that a GDPR Code of conduct will:

  • Enable the sector to align on key data protection positions, providing more consistency, clarity and certainty for clinical research.
  • Bring more certainty to third parties .
  • Clarify the linkages between the GDPR and other key sectoral legislation such as the Clinical Trials Regulation.
  • Respond to the Commissions policy ambition for the European Health Data Space to improve data governance, etc.

Read Also: Bluetooth Vr Headset With Earphones

Ai: Taxonomy And Business Models

The European Institute of Innovation and Technology published two reports on Artificial Intelligence business models and taxonomy in Europe. Both reports give in-depth recommendations on how to streamline knowledge, experience and expertise in AI deployment as well as connect, share and encourage an open innovation environment with policy leaders, industrial experts and innovator communities, . The trust ecosystem on Ethical AI includes but is not limited to such dimensions:

  • human agency and oversight
  • technical robustness and safety
  • privacy and data governance
  • transparency
  • diversity, non-discrimination and fairness , and more.

Nist Sp 800 121 Guide To Bluetooth Security

Document: Link


The NISTs Guide to Bluetooth Security is a standard that takes into account multiple other security standards and guidelines proposed by the NIST and the U.S. Department of Commerce . The target document is the second revision to the SP 800 121.


Version Support: The standard was developed to cover the following Bluetooth versions: 1.1, 1.2, 2.0 + Enhanced Data Rate , 2.1 + EDR, 3.0 + High Speed , 4.0, 4.1, and 4.2, as well as to provide support for the low energy feature, Bluetooth Low Energy . This current iteration of the SP 800 121 provides a thorough approach focusing on safety concerns regarding short-range RF communication used to establish Wireless Personal Area Networks .

Bluetooth Technical Capabilities, Architecture, and Specification Compliance: The document provides a brief examination of the benefits of Bluetooth and a more elaborate analysis of the architecture and technical capabilities of different versions. This includes the following:

Bluetooth Service Levels, Security Features, and Vulnerabilities: NIST breaks down security for Bluetooth devices in the form of five different Service Levels of security:

  • Level 4: Authenticated link key using Secure Connections required
  • Level 3: Authenticated link key required
  • Level 2: Unauthenticated link key required
  • Level 1: No security required
  • Level 0: No security required.


You May Like: Best Noise Cancelling Bluetooth Headphones For Phone Calls

Fler Bcker Av U S Department Of Commerce

  • U S Department Of Commerce-Nist, Mark A Kedzierski


  • U S Department Of Commerce-Nist, Scott Kukuck


  • Edward A Early, E Amber Thompson, U S Department Of Commerce-Nist


  • Sally S Bruce, Albert C Parr, U S Department Of Commerce-Nist


  • Singles day
  • Bokus har sålt böcker online sedan 1997. I utbudet på över 10 miljoner böcker hittar du både fysiska och digitala böcker till låga priser. Läs hur du vill – på papper, på skärm eller streama iBokus Play – abonnemanget för ljudböcker och e-böcker. Vi klimatkompenserar alla kundfrakter genomVi-skogen.

    Nist Releases Final Bluetooth Security Guide

    NIST SP 800 121 Guide to Bluetooth Security

    The National Institute of Standards and Technology June 12 released the final version of its revised Bluetooth security guide.

    The document describes the security capabilities of technologies based on Bluetooth, an open standard for short-range radio frequency communication, and gives recommendations to organizations on securing their devices effectively NIST explained in a statement accompanying the guides release. The technology, included in devices like cellphones and laptops, allows users to form networks to transfer data between devices.

    The publication is a revision of the original Bluetooth guide, which the agency released in September 2008. NIST released a draft version of the …

    To read the full article log in.

    You May Like: Bluetooth Speaker For Outdoor Movie

    Popular Articles

    Related Stories